Page 5 of 63 results (0.017 seconds)

CVSS: 9.0EPSS: 12%CPEs: 2EXPL: 0

Unspecified vulnerability in the NCP service in Novell eDirectory 8.8.5 before 8.8.5.6 and 8.8.6 before 8.8.6.2 allows remote attackers to cause a denial of service (hang) via a malformed FileSetLock request to port 524. Vulnerabilidad no especificada en el servicio NPC en Novell eDirectory v8.8.5 anterior a v8.8.5.6 y v8.8.6 anterior a v8.8.6.2, permite a atacantes remotos provocar una denegación de servicio (cuelgue) a través de una petición FileSetLock mal formada al puerto 524. This vulnerability allows attackers to deny services on vulnerable installations of Novell eDirectory. Authentication is not required in order to trigger this vulnerability. The flaw exists within Novell's eDirectory Server's NCP implementation. Novell's eDirectory Server binds to port 524 for processing NCP requests. • http://dvlabs.tippingpoint.com/blog/2011/02/07/zdi-disclosure-novell http://secunia.com/advisories/43186 http://securityreason.com/securityalert/8071 http://www.novell.com/support/viewContent.do?externalId=7007781&sliceId=2 http://www.securityfocus.com/archive/1/516279/100/0/threaded http://www.securityfocus.com/bid/46263 http://www.vupen.com/english/advisories/2011/0305 http://www.zerodayinitiative.com/advisories/ZDI-11-060 •

CVSS: 9.0EPSS: 1%CPEs: 2EXPL: 2

Stack-based buffer overflow in the dhost module in Novell eDirectory 8.8 SP5 for Windows allows remote authenticated users to cause a denial of service (dhost.exe crash) and possibly execute arbitrary code via a long string to /dhost/modules?I:. Desbordamiento de búfer basado en pila en el módulo dhost en Novell eDirectory v8.8 SP5 para Windows, permite a usuarios autenticados remotos a provocar una denegación de servicio (caida de dhost.exe) y posiblemente ejecutar código arbitrario a través de una cadena larga sobre /dhost/modules?I:. • https://www.exploit-db.com/exploits/33351 http://www.securityfocus.com/archive/1/507812/100/0/threaded http://www.securityfocus.com/bid/37009 https://exchange.xforce.ibmcloud.com/vulnerabilities/54264 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.0EPSS: 71%CPEs: 2EXPL: 5

Stack-based buffer overflow in the dhost module in Novell eDirectory 8.8 SP5 for Windows allows remote authenticated users to execute arbitrary code via long sadminpwd and verifypwd parameters in a submit action to /dhost/httpstk. Desbordamiento de búfer basado en pila Novell eDirectory v8.8 SP5 para Windows, permite a atacantes remotos ayudados por el usuario ejecutar código arbitrario a través de los parámetros largos sadminpwd y verifypwd en una acción submit sobre /dhost/httpstk. • https://www.exploit-db.com/exploits/10163 http://downloads.securityfocus.com/vulnerabilities/exploits/37042-2.pl http://tcc.hellcode.net/advisories/hellcode-adv005.txt http://tcc.hellcode.net/sploitz/httpstk.txt http://www.securityfocus.com/archive/1/507926/100/0/threaded http://www.securityfocus.com/bid/37042 http://www.securitytracker.com/id?1023188 https://exchange.xforce.ibmcloud.com/vulnerabilities/54308 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 7%CPEs: 1EXPL: 3

The dhost web service in Novell eDirectory 8.8.5 uses a predictable session cookie, which makes it easier for remote attackers to hijack sessions via a modified cookie. El servicio Web dhost en Novell eDirectory v8.8.5 usa una cookie de sessión predecible, lo que facilita que atacantes remotos secuestren sesiones a través de una cookie modificada. • https://www.exploit-db.com/exploits/33767 http://osvdb.org/60035 http://www.metasploit.com/modules/auxiliary/admin/edirectory/edirectory_dhost_cookie http://www.metasploit.com/redmine/projects/framework/repository/entry/modules/auxiliary/admin/edirectory/edirectory_dhost_cookie.rb https://exchange.xforce.ibmcloud.com/vulnerabilities/56613 - • CWE-310: Cryptographic Issues •

CVSS: 8.5EPSS: 1%CPEs: 19EXPL: 0

Unspecified vulnerability in eMBox in Novell eDirectory 8.8 SP5 Patch 2 and earlier allows remote attackers to cause a denial of service (crash) via unknown a crafted SOAP request, a different issue than CVE-2008-0926. Vulnerabilidad no especificada en eMBox en Novell eDirectory v8.8 SP5 Patch 2 y anteriores permite a atacantes remotos provocar una denegación de servicio (cuelgue) mediante peticiones SOAP manipuladas desconocidas, una incidencia diferente a CVE-2008-0926. This vulnerability allows remote attackers to deny services on vulnerable installations of Novell eDirectory Server. Authentication is not required to exploit this vulnerability. The specific flaw exists within the NDS daemon's SOAP service. When a malformed request is made to the novell.embox.connmgr.serverinfo SOAP action, the daemon makes an illegal reference thereby resulting in a denial of service. • http://www.novell.com/support/php/search.do?cmd=displayKC&docType=kc&externalId=InfoDocument-patchbuilder-readme5067743&sliceId=&docTypeID=DT_SUSESDB_PSDB_1_1&dialogID=122457794&stateId=0%200%20122459671 http://www.novell.com/support/viewContent.do?externalId=3426981 http://www.securitytracker.com/id?1023558 http://www.vupen.com/english/advisories/2010/0334 •